INTERNET THREATS

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/101

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:29 PM on 4/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

102 Terms

1
New cards

INTERNET THREATS

The internet enables fast communication, education, innovation, and open data sharing, making it a key part of modern life

○ Global connectivity fosters innovation but also exposes systems to exploitation by malicious actors

○ Users must balance benefits with the need to protect personal data and maintain safe online practices

2
New cards

Global connectivity

fosters innovation but also exposes systems to exploitation by malicious actors

3
New cards

Innovation & Connectivity

Facilitates knowledge sharing, collaboration, and rapid communication

4
New cards

Exploitation Targets

Attackers exploit system vulnerabilities for financial, political, or personal gain

5
New cards

Inherent Risks

Every online interaction carries risks, emphasizing the need for secure practices

6
New cards

Financial & System Losses

Fraud, critical system corruption, and operational disruption

7
New cards

Identity Theft Impact

Stolen identities exploited for fraudulent activities, causing legal and financial complications

8
New cards

Reputational Damage

Cyberattacks expose sensitive data, harming organizations’ credibility

9
New cards

Malware (Malicious Software)

Programs designed to infiltrate and damage computers or networks

10
New cards

Viruses

Spread by infecting files and applications

11
New cards

Worms

Self-replicating, spread through networks without user action

12
New cards

Ransomware

Encrypts user data, demands payment for restoration

13
New cards

Spyware

Secretly gathers user info without consent

14
New cards

Phishing & Social Engineering

Fraudulent attempts to trick users into revealing sensitive data via fake emails, websites, or messages

○ Often disguised as trustworthy entities (banks, popular services)

○ Exploits psychological manipulation

15
New cards

Denial-of-Service (DoS) & Distributed DoS (DDoS)

Flood servers or networks with traffic, making services unavailable

16
New cards

Distributed DoS (DDoS)

Uses multiple sources, making attacks more potent

17
New cards

Man-in-the-Middle (MitM) Attacks

Intercept communications between two parties to steal or alter data unnoticed

18
New cards

Zero-Day Exploits

Target unknown or unpatched software/hardware vulnerabilities before developers release fixes

19
New cards

Identity Theft & Data Breaches

Unauthorized access to personal or organizational data leading to financial, legal, and reputational harm

20
New cards

Individual Hackers

Driven by curiosity, challenge, revenge, or financial gain

21
New cards

Cybercriminal Groups

Organized networks targeting large-scale financial fraud, blackmail, or data theft

22
New cards

Hacktivists

Politically or socially motivated groups using cyberattacks to promote ideologies

23
New cards

State-Sponsored Attackers

Governments targeting other nations for espionage, sabotage, or information warfare

24
New cards

Insider Threats

Employees or associates misusing access to harm an organization

25
New cards

Proactive Prevention

Recognize suspicious activity, avoid scams

26
New cards

Protection of Personal/Organizational Data

Safeguard sensitive information

27
New cards

Reduced Financial/Reputational Risk

Prevent costly breaches financial and reputational damage

28
New cards

Empowerment Through Knowledge

Users contribute to collective defense against evolving threats

29
New cards

Use Strong and Unique Passwords

Avoid using the same password on multiple sites.

30
New cards

Multi-Factor Authentication (MFA)

Adds extra security beyond passwords

31
New cards

Keep Software and Systems Updated

Regular updates fix security vulnerabilities

32
New cards

Install Reliable Security Software

Anti-virus and firewall protection are essential

33
New cards

Be Skeptical of Unknown Emails and Links

Avoid clicking suspicious attachments or links

34
New cards

Secure Personal Devices

Use encryption, screen locks, disable automatic connections to unknown networks.

35
New cards

Regularly Back Up Important Data

Protect against data loss from malware or hardware failure.

36
New cards

Hacking

Gaining unauthorized access to systems to computer systems, networks, or digital devices to exploit, manipulate, or damage data.

○ Not all hacking is malicious, but it is often linked to cybercriminal activities compromising security, privacy, and trust.

● Can range from subtle infiltration to aggressive system disruption.

○ Cybercriminals use various techniques to breach defenses and access sensitive information

37
New cards

Phishing (Hacking Method)

Tricks users into revealing personal or financial info via fake emails, websites, or messages

■ Often uses deceptive designs mimicking trusted organizations

38
New cards

Ransomware Attacks

Infects systems, encrypts critical data, and demands payment for restoration

■ Prevents users from accessing files until ransom is paid

39
New cards

Trojan Horses & Malware

Malicious software disguised as legitimate programs

■ Can damage systems or give attackers unauthorized control

40
New cards

Brute Force Attacks

Repeatedly guesses passwords to gain access

■ Exploits weak or common passwords

41
New cards

Software Vulnerability Exploitation

– Uses unpatched flaws in operating systems or applications

■ Allows attackers to infiltrate systems and compromise data integrity

42
New cards

Hacking Effects

Steal data, disrupt services, spy on users, take over networks

43
New cards

White-Hat Hackers (Ethical Hackers)

Cybersecurity professionals using skills ethically.

○ Employed by companies, governments, or security firms for penetration testing.

○ Goal: Identify vulnerabilities before malicious hackers exploit them.

○ Help strengthen digital security and protect data.

44
New cards

Black-Hat Hackers (Malicious Hackers)

– Hack networks or systems illegally for personal, financial, or political gain.

○ Actions: Data theft, unauthorized surveillance, malware spreading, shutting down services.

○ Threaten individuals, organizations, and national infrastructure

45
New cards

Gray-Hat Hackers (Ambiguous Ethics)

– Access systems without permission but not necessarily with harmful intent.

○ Goal: Expose security flaws, sometimes inform system owners afterward.

○ Still considered illegal due to lack of authorization.

46
New cards

Data Breaches (Impact of Hacking)

Loss of sensitive personal or organizational data

47
New cards

Financial Losses (Impact of Hacking)

Theft of money or resources via fraud

48
New cards

Service Disruption (Impact of Hacking)

Downtime of websites, apps, or networks

49
New cards

Reputation Damage (Impact of Hacking)

Loss of trust from users and public

50
New cards

Legal & Regulatory Penalties (Impact of Hacking)

– For organizations failing to protect data

51
New cards

Cracking

– act of breaking into software, systems, or networks by bypassing security measures like passwords or licensing restrictions to gain unauthorized access.

○ Commonly undertaken for illegal purposes like software piracy and software.

○ Gaining unauthorized, free access to premium or paid digital products

○ Primary Motives

■ Focused on circumventing restrictions applied by developers.

■ Specifically focuses on breaching protection mechanisms, software architectures, or data.

52
New cards

Digital Content (Common Targets Cracking)

– Cracking enables unauthorized access to movies, music, or e-books, often creating rights management system breaches.

53
New cards

Games (Common Targets Cracking)

– Frequently cracked to bypass purchase requirements or digital rights management, avoiding payments

54
New cards

Software (Common Targets Cracking)

– Developers implement license restrictions to counter software cracking, but it remains a primary target, leading to widespread piracy

55
New cards

Spread of Illegal Software (Effects of Cracking)

Cracked softwareis often shared, increasing prevalence of illegal copies and undermining intellectual property protections.

56
New cards

Malware Risks (Effects of Cracking)

Cracked files may contain malicious software, exposing users to enhanced risks like data theft, ransomware, or system damage

57
New cards

Loss of Income for Developers (Effects of Cracking)

Cracking deprives creators and developers of crucial revenue, impacting future product development.

58
New cards

Password Cracking (Common Types of Cracking)

– Involves using specialized tools and techniques to guess or break user passwords, often compromising sensitive accounts or devices.

59
New cards

Software Cracking (Common Types of Cracking)

– Entails the removal or bypassing of licensing systems, enabling unauthorized use of software applications without restrictions.

60
New cards

Encryption Cracking (Common Types of Cracking)

– Uses advanced tools to decode encrypted data, breaching protected information critical to industries or individuals.

61
New cards

Virus

Malicious software that replicates and spreads across systems

62
New cards

Virus Impact

Slow performance, corrupted files, system crashes, unusual behavior

63
New cards

Self-replicating malware

: Damages systems, steals data, or compromises functionality.

64
New cards

Attachment to Hosts

: Viruses attach to files or programs, activating when executed by users

65
New cards

Slow performance (Potential Impact Virus)

– A dramatic decrease in system speed can indicate infection.

66
New cards

Corrupted or missing files

– Files disappearing or being altered without user action.

67
New cards

System crashes (Potential Impact Virus)

– Frequent, unexpected reboots or errors caused by malicious activities disrupting system processes.

68
New cards

Unusual behavior (Potential Impact Virus)

– Unauthorized pop-ups, high network traffic, or unknown programs running may signify infection.

69
New cards

Malicious Downloads (How Viruses Spread)

– From unverified sources, peer-to-peer networks, or pirated media. Spread through unverified downloads

70
New cards

Infected Websites (How Viruses Spread)

– Visiting compromised sites can trigger automatic downloads

71
New cards

Email Attachments (How Viruses Spread)

– Hidden in phishing emails or unsolicited messages.

72
New cards

Worms (Common Types of Computer Viruses)

Standalone programs that don’t need a host file.

○ Exploit OS/app vulnerabilities to spread quickly.

○ Aim: steal data, corrupt files, consume resources.

73
New cards

File Infector Viruses (Common Types of Computer Viruses)

Attach to executable files and activate when file runs, can delete files, steal data, or replicate

74
New cards

Boot Sector Viruses (Common Types of Computer Viruses)

Target boot sectors of storage devices.

○ Loaded at startup, bypassing some security software.

○ Can corrupt data or crash systems.

75
New cards

Multipartite Viruses (Common Types of Computer Viruses)

– Hybrid of file infector and boot sector viruses.

○ Infects files and system sectors simultaneously.

○ Hard to detect and remove.

76
New cards

Polymorphic Viruses (Common Types of Computer Viruses)

– Change code/appearance with each infection.

○ Bypass traditional antivirus, disrupt operations, steal info

77
New cards

Overwrite Viruses (Common Types of Computer Viruses)

– Replace infected file contents with malicious code. Often targets executables → permanent data loss.

78
New cards

Trojan Horses (Common Types of Computer Viruses)

– Disguise as legitimate software.

○ Don’t self-replicate but enable data theft, surveillance, or system control.

79
New cards

Disconnect from Internet (BASIC VIRUS TROUBLESHOOTING)

Prevents virus spread or sending personal data to attackers.

80
New cards

Enter Safe Mode (BASIC VIRUS TROUBLESHOOTING)

Load only essential OS files, preventing full virus activation.

81
New cards

Run Full System Scan (BASIC VIRUS TROUBLESHOOTING)

Use updated antivirus/anti-malware software. Quarantine or delete threats.

82
New cards

Delete Temporary Files (BASIC VIRUS TROUBLESHOOTING)

Viruses often hide in temp folders; empty Recycle Bin.

83
New cards

Change Passwords (BASIC VIRUS TROUBLESHOOTING)

Once clean, update critical passwords using a trusted device

84
New cards

Software & System Security (PREVENTIVE MEASURES: virus)

– Install/maintain antivirus software with daily updates.

○ Keep OS and apps updated for security patches.

○ Enable firewall to monitor and block unauthorized access

85
New cards

Firewall

Blocks unauthorized access

86
New cards

Email Safety & Download Safety (PREVENTIVE MEASURES: virus)

– Don’t open attachments from unknown senders.

○ Scan removable media before use.

○ Download from official/verified sources only.

87
New cards

Password & Network Habits

– Use strong, unique passwords for each account.

○ Avoid unknown or suspicious links.

○ Regularly backup important data externally or in secure cloud.

88
New cards

Online Scams (OTHER TYPES OF INTERNET THREATS)

– Fake deals or emails trick users into sharing info or losing money.

89
New cards

Fake Information (OTHER TYPES OF INTERNET THREATS)

– Misleading or false content to manipulate politically, financially, or socially

90
New cards

Website Spoofing (OTHER TYPES OF INTERNET THREATS)

– Fake websites imitate legit ones to steal passwords or bank details

91
New cards

Rootkits & Scareware (OTHER TYPES OF INTERNET THREATS)

– Rootkits give hidden control; scareware uses fake warnings to install harmful software.

92
New cards

Cryptojacking (OTHER TYPES OF INTERNET THREATS)

– Exploits computers to mine cryptocurrency without consent.

93
New cards

Recognizing Safe Content (DIGITAL LITERACY AND ONLINE SAFETY)

– Discern reliable material, safeguard data, navigate online safely.

94
New cards

Core Digital Literacy (DIGITAL LITERACY AND ONLINE SAFETY)

– Verify website credibility, check source reputation, avoid untrustworthy platforms.

95
New cards

Evaluating Sources (DIGITAL LITERACY AND ONLINE SAFETY)

– Identify reliable vs. unreliable news or updates.

96
New cards

Avoiding Cyber Threats (DIGITAL LITERACY AND ONLINE SAFETY)

– Be cautious with links, downloads, and sharing personal info.

97
New cards

Digital Footprints (DIGITAL LITERACY AND ONLINE SAFETY)

– Stay mindful of traces online to protect data.

98
New cards

Promoting Awareness (DIGITAL LITERACY AND ONLINE SAFETY)

– Learn online threats and indicators to strengthen defense

99
New cards

Passwords (Best Practices For Online Safety)

– Use strong, unique passwords.

■ Enable 2-step verification. Use password managers to store passwords safely.

100
New cards

Cybersecurity Tools (Best Practices For Online Safety)

– Install antivirus software. Activate firewalls.

■ Use Virtual Private Networks (VPNs).

Explore top notes

note
Biology Exam 1
Updated 548d ago
0.0(0)
note
enzymes_handouts
Updated 424d ago
0.0(0)
note
Diffusion and Concentration
Updated 1224d ago
0.0(0)
note
Translation
Updated 1334d ago
0.0(0)
note
Group 16 elements
Updated 1355d ago
0.0(0)
note
Reconstruction
Updated 1132d ago
0.0(0)
note
Heimler APUSH TP 5.10
Updated 472d ago
0.0(0)
note
Biology Exam 1
Updated 548d ago
0.0(0)
note
enzymes_handouts
Updated 424d ago
0.0(0)
note
Diffusion and Concentration
Updated 1224d ago
0.0(0)
note
Translation
Updated 1334d ago
0.0(0)
note
Group 16 elements
Updated 1355d ago
0.0(0)
note
Reconstruction
Updated 1132d ago
0.0(0)
note
Heimler APUSH TP 5.10
Updated 472d ago
0.0(0)

Explore top flashcards

flashcards
Unit 1 AP GOV
63
Updated 353d ago
0.0(0)
flashcards
Psicologia social Parte 2
80
Updated 620d ago
0.0(0)
flashcards
SAT Math Formulas & Terms
26
Updated 388d ago
0.0(0)
flashcards
Macbeth Vocab #4
20
Updated 1155d ago
0.0(0)
flashcards
Chemistry equations
26
Updated 1043d ago
0.0(0)
flashcards
Civil Rights EK 3
60
Updated 60d ago
0.0(0)
flashcards
Unit 1 AP GOV
63
Updated 353d ago
0.0(0)
flashcards
Psicologia social Parte 2
80
Updated 620d ago
0.0(0)
flashcards
SAT Math Formulas & Terms
26
Updated 388d ago
0.0(0)
flashcards
Macbeth Vocab #4
20
Updated 1155d ago
0.0(0)
flashcards
Chemistry equations
26
Updated 1043d ago
0.0(0)
flashcards
Civil Rights EK 3
60
Updated 60d ago
0.0(0)